🛡️ Recovering a Compromised Network in Under 1 Hour

Challenge: A company contacted me after they lost access to internal systems due to a ransomware attack.

My Role: I immediately began recovery and investigation using both live and backup methods.

Actions Taken:

Outcome: Full access was restored in under 1 hour. No ransom was paid.

Tools Used: Linux live boot, Bitdefender, Clonezilla, Security Onion

← Back to Home